Candidate Key

A subset of attributes, columns, or fields that can be used to uniquely identify any record in a table.

Similar items:
A specific key from the set of candidate keys that is used as the main differentiator between records. Every record must have a unique value in its primary key field. An attribute that contains values that uniquely identifies the record in which the key exists.
The address of a record (or other data grouping) contained in another record so that a program may access the former record when it has retrieved the latter record. The address can be absolute, relative, or symbolic, and hence the pointer is referred to as absolute, relative, or symbolic.
A form of cryptographic transposition based on arranging plain text in a form that generates columns; then the columns are extracted as the cipher text.
A characteristic defined for a class. Attributes are used to maintain the state of the object of a class. Values can be connected to objects via the attributes of the class. Typically, the connected value is determined by an operation with a single parameter identifying the object. Attributes implement the properties of a type. A column within a table of a relational database.
A process used to identify vulnerabilities, or weaknesses. It can include both technical means, such as vulnerability scans, and nontechnical means, such as an evaluation or inspection of existing data on threats and vulnerabilities. Examination of information to identify the elements comprising a vulnerability. The systematic examination of systems to determine the adequacy of security measures, identify security deficiencies, and provide data from which to predict the effectiveness of proposed security measures.

There are no comments yet.

Authentication required

You must log in to post a comment.

Log in